


{"id":1883,"date":"2017-10-19T14:24:27","date_gmt":"2017-10-19T05:24:27","guid":{"rendered":"http:\/\/www.cc.tsukuba.ac.jp\/wp_e\/?p=1883"},"modified":"2017-10-23T11:13:02","modified_gmt":"2017-10-23T02:13:02","slug":"vulnerabilities-discovered-in-wpa2","status":"publish","type":"post","link":"https:\/\/www.cc.tsukuba.ac.jp\/wp_e\/vulnerabilities-discovered-in-wpa2\/","title":{"rendered":"Vulnerabilities Discovered in WPA2"},"content":{"rendered":"<p>Wi-Fi Protected Access II (WPA2) is a standard for encrypted communications on wireless LAN (Wi-Fi) networks, and it has been announced that some vulnerabilities are discovered in WPA2, such as encryption key theft. If a third party exploits the vulnerabilities within the range of a wireless network, your communications on the network can be intercepted. To defend against these vulnerabilities, you need to install updates to affected products. <\/p>\n<p>Individual users should take the following precautions:<br \/>\n&#8211;\tInstall updates to fix the vulnerabilities.<br \/>\nMicrosoft released security updates in October, 2017.<br \/>\n\u3010Microsoft Corporation Information for VU#228519\u3011<br \/>\nhttps:\/\/www.kb.cert.org\/vuls\/id\/CHEU-AQNMYP<\/p>\n<p>If new security updates are not available for your OS, consider doing the following:<\/p>\n<p>&#8211;\tAvoid sending important information from a website whose URL starts with \u201chttp\u201d.<br \/>\n&#8211;\tUse a VPN.<br \/>\n&#8211;\tUse a wired network.<\/p>\n<p>\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2013<\/p>\n<p>\u3010IPA Information\u3011<br \/>\nhttps:\/\/www.ipa.go.jp\/security\/ciadr\/vul\/20171017_WPA2.html<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Wi-Fi Protected Access II (WPA2) is a standard for encrypted communications on wireless LAN (Wi-Fi) networks, and it has been announced that some vulnerabilities are discovered in WPA2, such as encryption key theft. If a third party exploits the vulnerabilities &hellip; <a href=\"https:\/\/www.cc.tsukuba.ac.jp\/wp_e\/vulnerabilities-discovered-in-wpa2\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":16,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[11],"tags":[],"class_list":["post-1883","post","type-post","status-publish","format-standard","hentry","category-news"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"publishpress_future_action":{"enabled":false,"date":"2026-04-26 12:59:05","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/www.cc.tsukuba.ac.jp\/wp_e\/wp-json\/wp\/v2\/posts\/1883","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cc.tsukuba.ac.jp\/wp_e\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cc.tsukuba.ac.jp\/wp_e\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cc.tsukuba.ac.jp\/wp_e\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cc.tsukuba.ac.jp\/wp_e\/wp-json\/wp\/v2\/comments?post=1883"}],"version-history":[{"count":4,"href":"https:\/\/www.cc.tsukuba.ac.jp\/wp_e\/wp-json\/wp\/v2\/posts\/1883\/revisions"}],"predecessor-version":[{"id":1891,"href":"https:\/\/www.cc.tsukuba.ac.jp\/wp_e\/wp-json\/wp\/v2\/posts\/1883\/revisions\/1891"}],"wp:attachment":[{"href":"https:\/\/www.cc.tsukuba.ac.jp\/wp_e\/wp-json\/wp\/v2\/media?parent=1883"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cc.tsukuba.ac.jp\/wp_e\/wp-json\/wp\/v2\/categories?post=1883"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cc.tsukuba.ac.jp\/wp_e\/wp-json\/wp\/v2\/tags?post=1883"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}